Search Results

= Members only

Current search

540 results.

[1] 2 3 4 5 6

Information Security--A Database View

Author: Zender, Anne

Source: Journal of AHIMA

Publication Date: March 1998



HIM professionals agree that applying the principles of information security is important in a hospital setting. But as Sharon Johnson, RRA, knows, those principles can be applied in many situations--including settings under construction. Since spring 1997, Johnson has been ....

Release of Information: the Basics

Author: Yaggie, Elaine

Source: Journal of AHIMA

Publication Date: May 2001




Whether you're new to the HIM profession or a long-time expert, release of information presents perennial challenges-especially in light of HIPAA. This article brings you the basics and the latest updates.
Release of health information has been a hot topic for years. Today, more....

Reaffirming Your HIPAA Compliance Efforts

Author: Woloszyn, William

Source: Journal of AHIMA

Publication Date: April 2005


Two years after the HIPAA privacy compliance date, is it time for your organization to reassess your efforts and recommit to enforcing HIPAA?
Revisiting HIPAA’s Roots

The HIPAA privacy regulation was created in response to public healthcare concerns about the privacy of pa....

Standards for Safety, Security, and Interoperability of Medical Devices in an Integrated Health Information Environment

Author: Williams, Patricia A.H

Source: Journal of AHIMA

Publication Date: April 2017



Information sharing between healthcare organizations increasingly includes the use of electronic health records (EHRs) as well as data from medical devices that have been integrated into existing networks. When exchanging such data, providers should be mindful not only of the interoperabil....

Statistically, What’s the Chance of a Breach?

Author: Wiedemann, Lou Ann

Source: Journal of AHIMA

Publication Date: March 2017



According to the Department of Health and Human Services Office for Civil Rights (OCR), from January 2016 to November 2016 approximately 169,013,996 people were affected by 1,737 healthcare breaches. The Ponemon Institute estimates that data breaches could cost the healthcare industry as m....

Subpoena by Any Other Name Might Not be Legal

Author: Whitney, Jo Ellen

Source: Journal of AHIMA

Publication Date: May 2007


Generally when an opposing party is seeking medical records from a care provider, the first request is accompanied by a subpoena, which can be difficult for an HIM department to assess in terms of what-if any-records can be produced.

A subpoena accompanied by a HIPAA-compliant consen....

Catching Up with HIPAA: Managing Noncompliance

Author: Weintraub, Abner E.

Source: Journal of AHIMA

Publication Date: May 2003


With the April 14 HIPAA privacy deadline behind us, many covered entities are still struggling to become compliant. Limited budgets and staff, conflicting advice, and unforeseen delays have all conspired to keep many covered entities from meeting the deadline.


What do you tell....

Workflow for Breach Notification

Author: Walsh, Tom

Source: Journal of AHIMA

Publication Date: April 2010


Federal regulations that took effect in September 2009 require HIPAA covered entities and their business associates to notify individuals if their protected health information (PHI) was accessed or disclosed in an unauthorized manner or by unauthorized individuals. Certain exemptions apply, su....

Proof Is in the Policy

Author: Walsh, Tom

Source: Journal of AHIMA

Publication Date: February 2004


Proving security compliance later requires establishing documentation now. HIM professionals have a valuable role to play.

HIM professionals played central roles in their organization’s privacy efforts, ensuring that appropriate policies, procedures, and documents were in plac....

Employee Confidentiality Training for the Electronic Health Record: A Systematic Review of Literature

Author: VanderMolen, Julia; Prince, Alesha; Neu, Emily; DeKraker, Rachael

Source: Educational Perspectives in Health Informatics and Information Management

Publication Date: October 2015


Abstract


Introduction: The healthcare industry is an ever-changing field, and in recent years, the introduction of the electronic health record (EHR) has enabled hospitals to store and retrieve detailed patient information for use by healthcare providers, and sometimes patients, d....

Guidance Specifying the Technologies and Methodologies That Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals for Purposes of the Breach Notification Requirements ... [of ARRA]

Author: U.S. Department of Health and Human Services. Office of the Secretary

Source: Government (U.S.)

Publication Date: April 27, 2009

[Federal Register: April 27, 2009 (Volume 74, Number 79)] [Rules and Regulations] [Page 19006-19010] From the Federal Register Online via GPO Access [wais.access.gpo.gov] [DOCID:fr27ap09-11] ======================================================================= ------------------------------------....

Mind Your Business Associate Access: Six Steps

Author: Sullivan, Tori E.

Source: Journal of AHIMA

Publication Date: October 2002


It's April 10, 2003, and a privacy officer is reviewing her policies for the imminent privacy regulations, title II of the Health Insurance Portability and Accountability Act (HIPAA) of 1996. The compliance deadline is April 13, 2003, and she is already feeling stressed about meeting the date.....

On the Line: Professional Practice Solutions

Author: Smith, Cheryl M.

Source: Journal of AHIMA

Publication Date: January 2001


Q: What is the difference between confidential and nonconfidential health information?

Q: Can a healthcare facility release health information for marketing purposes?

Q: What form must a subpoena duces tecum take in order to be valid?

Cheryl Smith is an AHIMA practice....

Information Governance for Offsite Data Security

Author: Saharia, Devendra

Source: Journal of AHIMA

Publication Date: April 2016



Disruptive technology can turn any industry on its head—virtually overnight. Just five years ago, summoning a taxi was an inefficient, time-consuming effort that often involved dialing up a dispatcher, who contacted a driver, who would then make their way to your location, perhaps in an h....

HITECH Security – A Practical Approach

Author: Rudloff, Rob

Source: AHIMA Convention

Publication Date: September 28, 2010


Background


HITECH has introduced new security requirements around HIPAA including new breach requirements and associated penalties. This paper addresses the information security and privacy requirements and provides practical solutions to address them. Many organizations already....

How Law, Investigation, Ethics Connect to HIPAA

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: November 02, 2003


Part nine in a 10-part series.
This article is the ninth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of law, investigation, and ethics covers these topics in depth and provides a p....

Cryptography and HIPAA: Breaking the Code

Author: Ruano, Michael

Source: In Confidence (newsletter)

Publication Date: June 02, 2003


Part four in a 10-part series.
This article is the fourth of a 10-part series that introduces the domains of information security and relates them to federal HIPAA regulations. The information security domain of cryptography is probably the most complex and mathematical of all the domai....

Behavioral Health Data Exchange Consortium. ONC State Health Policy Consortium Project: Final Report

Author: RTI International

Source: Government (U.S.) | U.S. Office of the National Coordinator for HIT

Publication Date: June 2014

To overcome barriers to electronic exchange of behavioral health data, Behavioral Health Data Exchange (BHDE) Consortium participants created a set of common policies and procedures that aligned with federal regulations as well as the laws of the participating states. The objective of the consortium project was to execute at least one successful pilot demonstrating the ability of providers to exchange behavioral health data electronically across state lines. At the end of the project, data was exchanged between providers in Florida and Alabama, and the necessary frameworks for exchange were established in three additional states.

Smart Cards for Healthcare: a Follow-up Visit

Author: Ross, Bruce

Source: In Confidence (newsletter)

Publication Date: March 02, 2000


Smart cards are a peculiar subject when it comes to healthcare in the United States. They are viewed as everything from an up-andcoming product to an inscrutable and hard to integrate backwater technology. Today, all that is rapidly changing. As shown by its adoption by Microsoft, Sun Micro,....

HITECH Frequently Asked Privacy, Security Questions: Part 3

Author: Rose, Angela Dinh; Greene, Adam H

Source: Journal of AHIMA | AHIMA Q and A

Publication Date: March 2014

This article concludes a three-part series discussing the most commonly asked questions regarding compliance requirements surrounding the final HITECH Omnibus Rule, released in January 2013. It highlights the updated requirements and provides answers to questions regarding decedent protected health information (PHI), the release of immunization records to schools, and the enhanced request for restrictions requirements.

Low-Tech Threats in a High-Tech World

Author: Rollins, Genna

Source: Journal of AHIMA - website

Publication Date: April 2011



Despite the rise of health IT, healthcare providers still face daily privacy and security risks of the mundane variety—paper records are misplaced, improperly disclosed, or released without confidential information redacted. No matter the opportunities and risks that technology bring....

Testimony on Behalf of The American Health Information Management Association (AHIMA) to the Privacy and Confidentiality Subcommittee of the National Committee of Vital and Health Statistics (NCVHS)

Author: Rode, Dan

Source: AHIMA testimony and comments

Publication Date: August 22, 2001

August 22, 2001


Mr. Rothstein, members of the Privacy and Confidentiality Subcommittee, ladies and gentlemen - good morning!

I am Dan Rode, vice president for the AHIMA. On behalf of the Association, its more than 40,000 members, and myself, thank you for the opportunity....

Raising Awareness of Medical Identity Theft: For Consumers, Prevention Starts with Guarding, Monitoring Health Information

Author: Rinehart-Thompson, Laurie A.

Source: Journal of AHIMA

Publication Date: October 2008


Financial identity theft has become ubiquitous in our global society. Its consequences are familiar, and fear of its repercussions has created a widespread reliance on credit bureaus for protection. According to the Federal Trade Commission, 8.3 million Americans were reportedly affected by fi....

Path to Security Breach Notification Regulation

Author: Rhodes, Harry B.

Source: AHIMA

Publication Date: August 24, 2009


Forty-four states, the District of Columbia, Puerto Rico, and the Virgin Islands enacted data breach notification and reporting laws well before the Health Information Technology for Economic and Clinical Health (HITECH) Act of the American Recovery and Reinvestment Act (ARRA) set the first f....

[1] 2 3 4 5 6